Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
The Logjam Attack
#2
We are on the way of upgrading.But please don't be too worried because
1.The attack is not easy to perform.
2.Most of major sites are using ECDH as their key exchange algorithm which is not affected by this vulnerability.(You can check the key exchange algorithm by clicking the yellow or green lock icon in front of location bar)
In fact vulnerablities are reported everyday, but few of them is fatal.
Reply


Messages In This Thread
The Logjam Attack - by reactor - 06-16-2015, 10:39 AM
RE: The Logjam Attack - by Admini - 06-16-2015, 03:55 PM
RE: The Logjam Attack - by reactor - 06-16-2015, 04:07 PM
RE: The Logjam Attack - by Admini - 07-02-2015, 06:39 PM
RE: The Logjam Attack - by reactor - 07-04-2015, 04:14 PM

Forum Jump:


Users browsing this thread: 2 Guest(s)